|
|
|
'use strict';
|
|
|
|
const common = require('../common');
|
|
|
|
|
|
|
|
if (!common.hasCrypto) {
|
|
|
|
console.log('1..0 # Skipped: missing crypto');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const assert = require('assert');
|
|
|
|
const https = require('https');
|
|
|
|
const fs = require('fs');
|
|
|
|
|
|
|
|
const options = {
|
|
|
|
key: fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
|
|
|
|
cert: fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem')
|
|
|
|
};
|
|
|
|
|
|
|
|
const tests = 2;
|
|
|
|
let successful = 0;
|
|
|
|
|
|
|
|
const testSucceeded = function() {
|
|
|
|
successful = successful + 1;
|
|
|
|
if (successful === tests) {
|
|
|
|
server.close();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
const body = 'hello world\n';
|
|
|
|
|
|
|
|
const serverCallback = common.mustCall(function(req, res) {
|
|
|
|
res.writeHead(200, { 'content-type': 'text/plain' });
|
|
|
|
res.end(body);
|
|
|
|
});
|
|
|
|
|
|
|
|
const server = https.createServer(options, serverCallback);
|
|
|
|
|
|
|
|
server.listen(common.PORT, function() {
|
|
|
|
// Do a request ignoring the unauthorized server certs
|
|
|
|
const noCertCheckOptions = {
|
|
|
|
hostname: '127.0.0.1',
|
|
|
|
port: common.PORT,
|
|
|
|
path: '/',
|
|
|
|
method: 'GET',
|
|
|
|
rejectUnauthorized: false
|
|
|
|
};
|
|
|
|
noCertCheckOptions.Agent = new https.Agent(noCertCheckOptions);
|
|
|
|
|
|
|
|
const req = https.request(noCertCheckOptions, function(res) {
|
|
|
|
let responseBody = '';
|
|
|
|
res.on('data', function(d) {
|
|
|
|
responseBody = responseBody + d;
|
|
|
|
});
|
|
|
|
|
|
|
|
res.on('end', function() {
|
|
|
|
assert.equal(responseBody, body);
|
|
|
|
testSucceeded();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
req.end();
|
|
|
|
|
|
|
|
req.on('error', function(e) {
|
|
|
|
throw e;
|
|
|
|
});
|
|
|
|
|
|
|
|
// Do a request that throws error due to the invalid server certs
|
|
|
|
const checkCertOptions = {
|
|
|
|
hostname: '127.0.0.1',
|
|
|
|
port: common.PORT,
|
|
|
|
path: '/',
|
|
|
|
method: 'GET'
|
|
|
|
};
|
|
|
|
|
|
|
|
const checkCertReq = https.request(checkCertOptions, function(res) {
|
|
|
|
res.on('data', function() {
|
|
|
|
throw new Error('data should not be received');
|
|
|
|
});
|
|
|
|
|
|
|
|
res.on('end', function() {
|
|
|
|
throw new Error('connection should not be established');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
checkCertReq.end();
|
|
|
|
|
|
|
|
checkCertReq.on('error', function(e) {
|
|
|
|
assert.equal(e.code, 'UNABLE_TO_VERIFY_LEAF_SIGNATURE');
|
|
|
|
testSucceeded();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
process.on('exit', function() {
|
|
|
|
assert.equal(successful, tests);
|
|
|
|
});
|